Anatomy of Network Attacks and How to Protect Against Them
Thursday, March 02, 2017: 2:15 PM - 2:45 PM
Who would have thought that a light bulb would become be a doorway to hackers? The Internet of Things has opened up incredible opportunities to monitor, interact with, and control our environment, but it has also opened up a seemingly infinite number of vulnerabilities to intruders who can cause significant harm. Examples include the recent massive DDoS attack that affected users of Twitter, Amazon, PayPal and others, but many more have occurred, and many more will continue to occur until these vulnerabilities are addressed. During this discussion we will review some recent network attacks that have occurred through connected lighting systems and other IoT devices. We will show how these types of attacks occur and the best strategies for mitigating these threats. We will also discuss the differences between software and hardware based security solutions and the potential dangers of relying solely on software implemented on a standard micro controller or SoC. In addition, this presentation will discuss the system level design framework for choosing the best security implementation. This implementation can help secure not only your network, but we will discuss how other vulnerabilities in your supply chain can be addressed as well, with the added benefit of being able to secure your revenue stream.